acm-header
Sign In

Communications of the ACM

News


bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Pwn2Own Hackers Breach a Tesla Twice
From ACM TechNews

Pwn2Own Hackers Breach a Tesla Twice

Participants of the Pwn2Own software exploitation conference hacked technology from automaker Tesla twice at the Zero Day Initiative's Pwn2Own software exploitation...

As Part of Ongoing Effort to Beef Up Cybersecurity, Biden Turns Gaze to Commercial Spyware
From ACM News

As Part of Ongoing Effort to Beef Up Cybersecurity, Biden Turns Gaze to Commercial Spyware

The Biden administration says commercial spyware has proliferated in recent years with few controls and a high risk of abuse.

At least 50 U.S. Government Employees Targeted with Phone Spyware Overseas
From ACM News

At least 50 U.S. Government Employees Targeted with Phone Spyware Overseas

White House bans federal agencies from using spyware that poses national security and human rights risks in the U.S.

Utah Law Could Curb Use of TikTok, Instagram by Children, Teens
From ACM TechNews

Utah Law Could Curb Use of TikTok, Instagram by Children, Teens

Utah's Governor Spencer J. Cox signed a social media bill that could restrict access to applications like TikTok and Instagram by children and adolescents.

Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug
From ACM TechNews

Hackers Drain Bitcoin ATMs of $1.5 Million by Exploiting 0-Day Bug

General Bytes reported that over $1.5 million in bitcoin was drained from Internet-accessible wallets via its bitcoin ATMs by hackers that exploited a previously...

Metaverse Landlords Are Creating a New Class System
From ACM News

Metaverse Landlords Are Creating a New Class System

Virtual landowners have found a way to put their investments to work, but with unintended consequences.

Researchers Reveal Inaudible Remote Cyber-Attacks on Voice Assistant Devices
From ACM TechNews

Researchers Reveal Inaudible Remote Cyber-Attacks on Voice Assistant Devices

Researchers developed the Near-Ultrasound Inaudible Trojan to show how hackers can exploit the vulnerabilities of smart device microphones and voice assistants...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account